| Source | Azure Portal | ||||||||||||||
| Display name | Private endpoint should be enabled for PostgreSQL flexible servers | ||||||||||||||
| Id | 5375a5bb-22c6-46d7-8a43-83417cfb4460 | ||||||||||||||
| Version | 1.0.0 Details on versioning |
||||||||||||||
| Versioning |
Versions supported for Versioning: 1 1.0.0 Built-in Versioning [Preview] |
||||||||||||||
| Category | PostgreSQL Microsoft Learn |
||||||||||||||
| Description | Private endpoint connections enforce secure communication by enabling private connectivity to Azure Database for PostgreSQL. Configure a private endpoint connection to enable access to traffic coming only from known networks and prevent access from all other IP addresses, including within Azure. | ||||||||||||||
| Cloud environments | AzureCloud = true AzureUSGovernment = unknown AzureChinaCloud = unknown |
||||||||||||||
| Available in AzUSGov | Unknown, no evidence if Policy definition is/not available in AzureUSGovernment | ||||||||||||||
| Mode | Indexed | ||||||||||||||
| Type | BuiltIn | ||||||||||||||
| Preview | False | ||||||||||||||
| Deprecated | False | ||||||||||||||
| Effect | Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
||||||||||||||
| RBAC role(s) | none | ||||||||||||||
| Rule aliases | THEN-ExistenceCondition (1)
|
||||||||||||||
| Rule resource types | IF (1) |
||||||||||||||
| Compliance | Not a Compliance control | ||||||||||||||
| Initiatives usage | none | ||||||||||||||
| History |
|
||||||||||||||
| JSON compare | n/a | ||||||||||||||
| JSON |
|